General
-
Target
22cc1db997c8b19d964010290bf86c90079c57ef93f10c12c0bc171b6f9afb5b
-
Size
2.0MB
-
Sample
240522-2lq6qabg58
-
MD5
d5fa6572fb082b3ff0f1874a729e714a
-
SHA1
1cb07a7333ab8800a3749e1a4bf6e8ae7e47ccc8
-
SHA256
22cc1db997c8b19d964010290bf86c90079c57ef93f10c12c0bc171b6f9afb5b
-
SHA512
79f25a70693b6c8923e69b4244f7095471855fed153910291392ed548860b6ca1f0a1ab1f2975dbb0667a2680d5026a5f7c46687b6168218fc704839c1b506b1
-
SSDEEP
49152:7QzHt472DGJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt0tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
22cc1db997c8b19d964010290bf86c90079c57ef93f10c12c0bc171b6f9afb5b.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
22cc1db997c8b19d964010290bf86c90079c57ef93f10c12c0bc171b6f9afb5b
-
Size
2.0MB
-
MD5
d5fa6572fb082b3ff0f1874a729e714a
-
SHA1
1cb07a7333ab8800a3749e1a4bf6e8ae7e47ccc8
-
SHA256
22cc1db997c8b19d964010290bf86c90079c57ef93f10c12c0bc171b6f9afb5b
-
SHA512
79f25a70693b6c8923e69b4244f7095471855fed153910291392ed548860b6ca1f0a1ab1f2975dbb0667a2680d5026a5f7c46687b6168218fc704839c1b506b1
-
SSDEEP
49152:7QzHt472DGJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt0tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-